Question No: 231 DRAG DROP – (Topic 10)

You need to implement a solution to meet the security requirement for the temporary employees.

You deploy an Active Directory Rights Management Services (AD RMS) cluster, and then you run the Set-IRMConfiguration cmdlet.

Which three actions should you perform?

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

Question No: 232 DRAG DROP – (Topic 10)

The Montreal data center experiences a power failure.

You need to ensure that all the users can access their mailbox. Which three actions should you perform?

To answer, move the three appropriate actions from the list of actions to the answer area and arrange them in the correct order.

Answer:

Question No: 233 – (Topic 11)

You need to recommend a solution that meets the compliance requirements for email messages that contain information about the Fabrikam acquisition.

Which three actions should you recommend? (Each correct answer presents part of the solution. Choose three.)

Create an Outlook protection rule.

Create a new custom message classification.

Modify the registry on all client computers.

Modify the Content Filtering settings.

Export the Message Classification configuration to an .xml file.

Answer: B,C,E Explanation:

B: Use the New-MessageClassification cmdlet to create a message classification instance in your organization.

E: After you create a new message classification, you can specify the message classification as a transport rule predicate. Before Microsoft Outlook and Outlook Web App users can apply the message classification to messages, you must update the end-user systems with the message classification XML file created by the Export- OutlookClassification.ps1 script file. The Export-OutlookClassification.ps1 script file is located in the %ExchangeInstallPath%Scripts directory.

C: Microsoft Office Outlook requires a local file (Classifications.xml) that contains definitions of the message classifications that Microsoft Exchange Server supports before Outlook users can apply message classifications to their messages. You must also create a registry key that enables message classification and references the Classifications.xml file on the Outlook user#39;s computer.

From scenario:

Compliance Requirements include:

Users must use a custom message classification when they send email messages that contain information about the planned acquisition of Fabrikam.

Question No: 234 – (Topic 11)

You need to implement a solution that meets the collaboration requirements. What should you do?

Run the Set-CASMailbox cmdlet.

Create an organization relationship.

Create a new sharing policy.

Modify the organization configuration.

Answer: B Explanation:

Scenario: Custom recipient MailTips created in the Exchange Server organization of Trey Research must be visible to the users at Fabrikam. The solution must ensure that administrators can define a subset of users who can share their MailTips.

MailTips Over Organization Relationships

You may want to restrict certain types of MailTips. You can either allow all MailTips to be returned or allow only a limited set that would prevent NDRs. You can configure this setting with the MailTipsAccessLevel parameter on the Set-OrganizationRelationship cmdlet.

Reference: MailTips over organization relationships

Question No: 235 DRAG DROP – (Topic 11)

You need to recommend a solution that supports the planned changes for the public folders.

Which four cmdlets should you recommend running in sequence? (To answer, move the appropriate four cmdlets from the list of cmdlets to the answer area and arrange them in the correct order.)

Answer:

Question No: 236 DRAG DROP – (Topic 11)

You need to identify which technologies must be used to meet the security requirements.

Which technologies should you identify? (To answer, drag the appropriate technologies to the correct requirements. Each technology may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)

Answer:

Question No: 237 HOTSPOT – (Topic 11)

You need to recommend a solution that meets the compliance requirements for emailing bank account numbers.

Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)

Answer:

Explanation:

* Scenario: All users must be notified before they send an email message that contains any five bank account numbers to an external recipient. The users must be able to override the requirement if they have a valid business reason to send the email message.

Message is rejected unless the sender has chosen to override the policy restriction. RejectUnlessExplicitOverride

This is the same as RejectUnlessSilentOverride, but the sender can also provide a justification for overriding the policy restriction.

Question No: 238 HOTSPOT – (Topic 11)

You are attempting to resolve the email delivery issue for Fabrikam.

You need to identify which certificate is being used by the servers in the Exchange Server organization of Fabrikam.

In which directory on EX1 should you review the log files? (To answer, select the appropriate directory in the answer area.)

Answer:

Explanation:

Scenario: After a change to a certificate, users report that email messages sent to Fabrikam are not delivered.

ProtocolLog

Protocol logging records the SMTP conversations that occur between messaging servers as part of message delivery. These SMTP conversations occur on Send connectors and Receive connectors that exist in the Front End Transport service on Client Access servers, the Transport service on Mailbox servers, and the Mailbox Transport service on Mailbox servers. You can use protocol logging to diagnose mail flow problems.

Question No: 239 – (Topic 11)

You need to implement a solution that meets the compliance requirements for the members of the legal department.

Which two cmdlets should you use? (Each correct answer presents part of the solution. Choose two.)

New-RoleAssignmentPolicy

Add-ManagementRoleEntry

New-ManagementRoleAssignment

New-ManagementRole

New-ManagementScope

Answer: C,D Explanation:

From scenario:

/ Only the users in the legal department must be able to use eDiscovery to view the contents of email messages sent by the finance department users.

/ Users in the legal department use a shared mailbox named Legal. Legal is enabled for In- Place Hold. Legal is the only mailbox on DB2.

We need to assign the role to the legal department users using the New- ManagementRoleAssignment cmdlet.

To restrict the eDiscovery access to the finance users emails, we need to create a scope using the New-ManagementScope cmdlet.

Question No: 240 HOTSPOT – (Topic 11)

You need to recommend a solution that meets the auditing requirements.

Which command should you include in the recommendation? (To answer, select the appropriate options in the answer area.)

Answer:

Explanation:

* Scenario:

The following actions must be audited for actions in the Legal mailbox only:

->Delegate – Purge mailbox content

->Delegate – Transfer file between folders

->Administrator – Messages sent by administrator

->Administrator – Open any content within the mailbox

* Use the Set-Mailbox cmdlet to modify the settings of an existing mailbox. HardDelete: An e-mail is permanently deleted

Move: An e-mail is moved to another folder

MessageBind: An e-mail is opened or viewed in the preview pane

Create: An item (excluding folders) is created in the mailbox (a message is sent, for example)